Month: October 2017

Security researchers have found a new critical security flaw dubbed “Krack” (Key Reinstallation Attacks) that affects literally every WiFi router and smart phone in use today. The reason? The security flaw resides in the WiFi standard itself, rather than in a third-party product. In addition to being vast in scope and scale, Krack is a […]

Groove Music has had a short, troubled life. It started out as Zune Music, but Microsoft bought it in 2012, promptly rebranding it as Xbox Music before changing its name again to Groove. Now, the company has decided to get out of the music business altogether, and is sending all of its paying customers over […]

Hackers are the new bank robbers in a very literal sense. Increasingly, hackers have taken to infiltrating bank networks specifically for the purpose of infecting ATMs attached to their network with malicious code that makes stealing from them a snap. Once the malware has been installed on a target machine, a lower level member of […]

Equifax’s problems just keep getting worse. Not long ago, the company suffered a major data breach that ultimately resulted in the CEO stepping down and a painful congressional grilling. Initial estimates placed the number of impacted users at some 143 million, but as the investigation has continued, it turns out that the numbers are even […]

It seems that hardly a week goes by that we don’t hear about another high-profile data breach. This time in the hot seat, we find Amazon-owned Whole Foods. Specifically, we find Whole Foods Market locations. The company is reporting that hackers were able to gain unauthorized access to credit card information at an undisclosed number […]

Researchers at the security firm CyberArk have discovered a new attack vector they’ve dubbed “Illusion Gap.” While it’s somewhat tricky for a hacker to implement, when it works, it can be devastatingly effective, completely bypassing Windows Defender, which is security software that comes pre-loaded on all Windows-based computers. To successfully execute the attack, the hacker […]

One of the first, best pieces of advice computer owners get is to always keep their operating system up to date. It’s sound advice, because OS manufacturers generally do a good job of responding to new attack vectors and releasing security patches designed to make sure that hackers don’t have an easy time breaking into […]

Deloitte is not exactly a household name. In fact, unless you use the company’s services, you may not have ever heard of them, even though they’re one of the largest accounting firms in the world. The company has the distinction of having been named the best cybersecurity consultant company in the world in 2012, and […]

Google’s latest Transparency Report is out, and the results have raised concerns with privacy advocates from around the world. This time last year, Google received 44,943 requests relating to 76,713 user accounts from the governments around the world. This year’s figures have increased to 48,941 requests relating to 83,345 accounts. The company acceded to 65 […]

Late last year, Yahoo announced that it was the victim of the largest data breach in history. It impacted, by their initial estimates, fully one third of their user base, some one billion users. As it turns out, Yahoo’s estimates were wildly inaccurate. Literally every person who had a Yahoo account in 2013 was impacted, […]

Solis Security Provides A Focused Set Of Managed IT And Cybersecurity Services Based On Your Organization’s Unique Needs. Whether You Need Technology Services In The Austin Area Or Anywhere Else, We Can Maintain And Support Your Technology Investments To Ensure Complete Security And Optimal Performance.

The Solis security website uses cookies to provide the best browsing experience and track key website data. Cookie-related data will not reveal your personal identity. Solis security employs third-party marketing tools and solutions to measure the effectiveness of our website, track key statistics regarding web visitors such as location, pages visited, technical web analytics and also to improve our overall marketing message. We employ Live Chat technologies to provide an immediate avenue for help and informaitn from Solis security. No personal information is shared until the website visitor offers to share. You are under no obligation to share any business information with Solis security. If you continue browsing our site, you are giving consent for the use of cookies and to allow Solis security to track information about your website visit.. For details, view our Privacy Policy and Ad and Cookie Policy.